Closed mcondarelli closed 11 months ago
- Source server is using deprecated key "core.trust_password"
That gets solved by unsetting that config key with lxc config unset core.trust_password
Thanks @stgraber,
Can you confirm that will not impair my ability to control that server (lxd
) from outside (cinderella
)?
I do not remember explicitly setting that variable (I assume it was implicitly set when I issued lxc config trust add
).
I am (was) unsure if it is needed or not.
If it is "not used anymore" as I seem to understand we can close this.
I will reopen (or open a new one) if I get further errors in lxd-to-incus
To be clear, I will:
lxc config unset core.trust_password
lxd-to-incus
incus config trust add
?)The certificate will be kept as part of the migration.
core.trust_password is a very unsafe way to add clients to a server which predates the current token based method (incus config trust add
).
So there's no real reason why anyone would still want to use that, it's just that LXD can't remove it due to API backward compatibility concerns. With Incus we just decided not to offer it from the start.
core.trust_password
is simple to use and acceptable/secure enough in some situations.
It's sad it was removed from Incus, I used it a lot and have many scripts that requires core.trust_password.
Trust tokens work almost the same way except that they can only be used a single time and can be easily revoked and controlled on the server side.
If you absolutely need to have a fixed credential, your other option would be to generate a client certificate, add that to the server trust store and then just use that client certificate on all the clients you need it to.
It's still not great security wise but you'll still avoid brute force attacks and can still revoke the whole thing easily enough.
A variation on that option would be to use the PKI mode instead. Which then allows you to generate as many client certificates as you want and have them be automatically allowed to interact with Incus so long as they're signed by the CA that Incus is using.
Required information
The output of "incus info":
Issue description
I tried to follow instructions but I hit an error:
I assume there's some problem in transporting certificate, but I'm unsure how to proceed. Documentation includes a relevant, but rather terse, paragraph:
A slightly expanded version about how to overcome possible problems would be highly appreciated.
I willing to write it, if someone tells me what should I do in this specific case.
Steps to reproduce
Have a working
LXD
installation remotely manageable. Note: I issued:to be able to remotely manage from
cinderella
.lxd-to-incus